July 19, 2016 Inside the Bunker at Wimbledon 2016 2 min read - IBM's security experts are dedicated to protecting the Wimbledon brand and its reputation as one of the premier tennis tournaments in the world.
July 19, 2016 Lucky Green Packs It In at Tor 2 min read - Lucky Green, one of Tor's earliest participants, has decided to leave the Tor project. Green will terminate the Bridge Authority.
July 18, 2016 Proof of Compromise? New Neutrino Exploit Runs on Research 2 min read - A new proof of concept (PoC) for a previously patched Internet Explorer vulnerability has made its way into the Neutrino exploit kit.
July 18, 2016 Cyberattacks From Outside the Perimeter Are Costly, Ponemon Institute Finds 2 min read - A new Ponemon study found that external cyberattacks are costly, yet security professionals don't have the perimeter tools needed to prevent them.
July 18, 2016 IBM MaaS360 Achieves Certification for Compliance With ISO 27001 Standards 2 min read - IBM MaaS360 achieves certification for compliance with ISO 27001 standards, exemplifying leadership as the most trusted and secure SaaS EMM solution.
July 14, 2016 Shard: Password Peace of Mind or Potential Problem? 2 min read - Shard is designed to help users track down and eliminate duplicate passwords. But what happens if cybercriminals repurpose the protective program?
July 14, 2016 Furtim’s Parent Goes After Power Companies 2 min read - Power companies should watch out for Furtim's Parent, a suspected state-sponsored malware variant currently targeting this high-profile industry.
July 14, 2016 MIT Shuffles Tor’s Technology With Riffle 2 min read - Riffle is a response from the Massachusetts Institute of Technology to the problems the Tor browser has been having as of late.
July 13, 2016 ‘Pokemon Go,’ Popular New AR Game, Can Load Malware 2 min read - "Pokemon Go" can load rootkits into devices along with the hot game, which could wreak havoc on individual users and enterprise networks alike.
July 12, 2016 Patchwork Problems: Copy-Pasted Code Creates New APT Threat 2 min read - Old copied-and-pasted code is enjoying a rejuvenation in the form of Patchwork, a malware that's making the most of its second chance.